12.07.2015 Views

MORNBFI Vol. 1 - Planters Development Bank

MORNBFI Vol. 1 - Planters Development Bank

MORNBFI Vol. 1 - Planters Development Bank

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

APP. Q-2508.12.31agency, business or imaginarytransactions, or by means of other similardeceits;(39) Estafa by altering the quality,fineness or weight of anything pertainingto his art or business;(40) Estafa by pretending to havebribed any government employee;(41) Estafa by postdating a check, orissuing a check in payment of anobligation when the offender has no fundsin the bank, or his funds deposited thereinwere not sufficient to cover the amountof the check;(42) Estafa by inducing another, bymeans of deceit, to sign any document;(43) Estafa by resorting to somefraudulent practice to ensure success in agambling game;(44) Estafa by removing, concealingor destroying, in whole or in part, anycourt record, office files, document or anyother papers.(J) Smuggling under R.A. Nos. 455and 1937;(45) Fraudulent importation of anyvehicle;(46) Fraudulent exportation of anyvehicle;(47) Assisting in any fraudulentimportation;(48) Assisting in any fraudulentexportation;(49) Receiving smuggled article afterfraudulent importation;(50) Concealing smuggled articleafter fraudulent importation;(51) Buying smuggled article afterfraudulent importation;(52) Selling smuggled article afterfraudulent importation;(53) Transportation of smuggledarticle after fraudulent importation;(54) Fraudulent practices againstcustoms revenue.(K) Violations under R.A. No. 8792,otherwise known as the ElectronicCommerce Act of 2000;K.1. Hacking or cracking, which refersto:(55) unauthorized access into orinterference in a computer system/server orinformation and communication system; or(56) any access in order to corrupt, alter,steal, or destroy using a computer or othersimilar information and communicationdevices, without the knowledge and consentof the owner of the computer or informationand communications system, including(57) the introduction of computerviruses and the like, resulting in thecorruption, destruction, alteration, theft orloss of electronic data messages orelectronic document;K.2. Piracy, which refers to:(58) the unauthorized copying,reproduction,(59) the unauthorized dissemination,distribution,(60) the unauthorized importation,(61) the unauthorized use, removal,alteration, substitution, modification,(62) the unauthorized storage,uploading, downloading, communication,making available to the public, or(63) the unauthorized broadcasting, ofprotected material, electronic signature orcopyrighted works including legallyprotected sound recordings or phonogramsor information material on protected works,through the use of telecommunicationnetworks, such as, but not limited to, theinternet, in a manner that infringesintellectual property rights;K.3. Violations of the Consumer Act orR.A. No. 7394 and other relevant orpertinent laws through transactions coveredby or using electronic data messages orelectronic documents:Manual of Regulations for Non-<strong>Bank</strong> Financial InstitutionsQ RegulationsAppendix Q-25 - Page 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!